Welcome Guest | Registration | Login

Ebooks Review

Main » Security

O..y M..a (2-2001) | PDF | 540 pages | 0596000111 | 6Mb

SSH, The Secure Shell: The Definitive Guide /by Daniel J. Barrett, Richard Silverman. Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based soluti ... Read more »
Category: Security | Views: 1425 | Added by: Ebooks | Date: 2012-12-28 | Comments (0)


O..y M..a (9-2007) | PDF | 860 pages | 0596009631 | 12Mb

Security Power Tools /by Bryan Burns. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts revea ... Read more »
Category: Security | Views: 467 | Added by: Ebooks | Date: 2012-12-21 | Comments (0)


S..s (9-2010) | PDF | 376 pages | 1597495883 | 10Mb

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques /by Thomas Wilhelm, Jason Andress. Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no do ... Read more »
Category: Security | Views: 573 | Added by: Ebooks | Date: 2012-12-03 | Comments (0)


M..w H..l 3/ed (7-2008) | PDF | 614 pages | 0072262575 | 10Mb


Hacking Exposed Linux, 3rd Edition /by ISECOM. This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services.
Completely rewritten the ISECOM way, Hacking Exposed Linux ... Read more »
Category: Security | Views: 421 | Added by: Ebooks | Date: 2012-11-04 | Comments (0)


S..er 2/ed (9-2011) | PDF | 1475 pages | 144195905X | 27.7Mb

Encyclopedia of Cryptography and Security /by Henk C.A. van Tilborg and Sushil Jajodia. Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and informat ... Read more »
Category: Security | Views: 2195 | Added by: Ebooks | Date: 2011-12-22 | Comments (0)


Ar..h H..e (9-2004) | PDF | 266 pages | 1580535313 | 1.9Mb

Outsourcing Information Security /by C. Warren Axelrod. This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks.
Unique in its scope, this single volume offers you compl ... Read more »
Category: Security | Views: 2223 | Added by: Ebooks | Date: 2011-12-13 | Comments (0)



S..ybex (6-2011) | EPUB | 336 Pages | 111801684X | 14.0Mb

Microsoft Windows Security Essentials /by Darril Gibson. Windows security concepts and technologies for IT beginners
IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and ... Read more »
Category: Security | Views: 2325 | Added by: Ebooks | Date: 2011-11-03 | Comments (0)



Kn0pf (10-2011) | EPUB+MOBI | 304 pages | 0307592936 | 2.7Mb

DarkMarket: Cyberthieves, Cybercops and You /by Misha Glenny. From one of the most intrepid investigative reporters at work today--an authoritative, edge-of-your-seat account of the new form of crime spawned by the digital world. We bank online; shop online; date, learn, work, live online. But have the institutions that ke ... Read more »
Category: Security | Views: 2318 | Added by: Ebooks | Date: 2011-11-02 | Comments (0)



Springer (9-2010) | PDF | 159 pages | 159 pages | 3.3Mb

Spyware and Adware /by John Daniel Aycock. Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at ... Read more »
Category: Security | Views: 2049 | Added by: Ebooks | Date: 2011-10-27 | Comments (0)



Wrox (3-2007) | PDF | 360 pages | 0470101547 | 7.8Mb

Professional Rootkits /by Ric Vieler. Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through ... Read more »
Category: Security | Views: 2281 | Added by: Ebooks | Date: 2011-10-19 | Comments (0)



Delacorte (9-2003) | PDF | 272 pages | 0385730624 | 1.8Mb

The Code Book: How to Make It, Break It, Hack It, Crack It /by Simon Singh. Calling upon accounts of political intrigue and tales of life and death, author Simon Singh tells history's most fascinating story of deception and cunning: the science of cryptography--the encoding and decoding of private information. Based on The Code ... Read more »
Category: Security | Views: 2351 | Added by: Ebooks | Date: 2011-10-18 | Comments (0)



Academic Press (3-2009) | PDF | 240 pages | 0123748909 | 2.6Mb

Cryptographic Boolean Functions and Applications /by Thomas W. Cusick and Pantelimon Stanica. Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of d ... Read more »
Category: Security | Views: 2262 | Added by: Ebooks | Date: 2011-09-30 | Comments (0)



Syngress (5-2011) | PDF | 360 pages | 1597496154 | 3.3Mb

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up /by Evan Wheeler. The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale be ... Read more »
Category: Security | Views: 2057 | Added by: Ebooks | Date: 2011-09-16 | Comments (0)



No Starch (4-2009) | PDF | 232 pages | 1593271921 | 3.0Mb


Gray Hat Python: Python Programming for Hackers and Reverse Engineers /by Justin Seitz. Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers ... Read more »
Category: Security | Views: 2382 | Added by: Ebooks | Date: 2011-09-09 | Comments (0)



Cisco Press (12-2008) | PDF | 576 pages | 1587055945 | 5.2Mb


IPv6 Security /by Scott Hogg and Eric Vyncke. As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security pract ... Read more »
Category: Security | Views: 2592 | Added by: Ebooks | Date: 2011-08-26 | Comments (0)

1 2 3 »